iControl REST uses REpresentational State Transfer (REST) to interact with F5. It will help to quickly get up and running with scripts that can lighten your workload via automation, help prevent potential issues by monitoring and preventing disaster before it strikes, silently tuning your deployment to fit your application’s needs without human intervention and more. Anything that you’re able to accomplish from the command line you can leverage programmatically via iControl REST.
You can do get information of the virtual <vs>
curl -sku admin:admin https://<host>/mgmt/tm/ltm/virtual/<vs>
Get stats of the virtual
curl -sku admin:admin https://<host>/mgmt/tm/ltm/virtual/<vs>/stats
And many more. Please refer the link - https://clouddocs.f5.com/api/icontrol-rest/# for more details.
If this inquiry is in relation to the CVE, know that whether or not you're using iControl REST, it's by default accessible on the system on the management interface and self IPs if port 443 is allowed. If that's the case, 1) disable self IP access immediately if not patched, 2) protect/inspect/analyze for your internal management access, and 3) patch!!
Good deal on getting patched! You can check your logs to see if anyone is taking advantage of the REST interface: